Its flexibility is most valuable. We can have a number of scenarios, and we can get logs from anything. If we know how to use Logstash, we can tweak it in many ways. This makes the logging search on Elastic very easy.
Elastic Security stands out for its speed, scalability, and intuitive interface. It integrates seamlessly with Elasticsearch and Kibana, providing efficient data indexing, centralized log management, and intelligent threat identification, all while being open-source.Elastic Security offers robust capabilities in security monitoring, threat identification, and SIEM functionalities. Its open-source nature enhances scalability, facilitating log aggregation and infrastructure monitoring. Users...
ELK is open-source, and it will give you the framework you need to build everything from scratch.
The most valuable feature is the search function, which allows me to go directly to the target to see the specific line a customer is searching for.
Its flexibility is most valuable. We can have a number of scenarios, and we can get logs from anything. If we know how to use Logstash, we can tweak it in many ways. This makes the logging search on Elastic very easy.
Enables monitoring of application performance and the ability to predict behaviors.
The solution is quite stable. The performance has been good.
We've found the initial setup to be quite straightforward.
I like the indexing of the logs.
The cost is reasonable. It's not overly pricey.
The indexes allow you to get your results quickly. The filtering and log passing is the advantage of Logstash.
The feature that we have found the most valuable is scalability.
The solution has a good community surrounding it for lots of helpful documentation for troubleshooting purposes.
The most valuable feature for me is Discover.
I use the stack every morning to check the errors and it's just so clear. I don't see any disadvantage to using Logstash.
ELK Logstash is easy and fast, at least for the initial setup with the out of box uses.
The most valuable feature is the ability to collect authentication information from service providers.
It's simple and easy to use.
The visualization is very good.
It is the best open-source product for people working in SO, managing and analyzing logs.